메뉴 건너뛰기




Volumn 12, Issue 5, 2012, Pages 5246-5272

Performance evaluation of fusing protected fingerprint minutiae templates on the decision level

Author keywords

Decision level fusion; Fingerprint; Minutiae template; Performance evaluation; Pseudonymous identifier; Template protection

Indexed keywords

ALGORITHM; ARTICLE; BIOMETRY; DECISION SUPPORT SYSTEM;

EID: 84861552727     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s120505246     Document Type: Article
Times cited : (12)

References (27)
  • 3
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs
    • Teoh, A.B.J.; Goh, A.; Ngo, D.C.L. Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 2006, 28, 1892-1901.
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell. , vol.28 , pp. 1892-1901
    • Teoh, A.B.J.1    Goh, A.2    Ngo, D.C.L.3
  • 9
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Preliminary version Adv. Cryptol.-EUROCRYPT 2004 2004, 3027, 523-540
    • Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 2008, 38, 97-139, Preliminary version Adv. Cryptol.-EUROCRYPT 2004 2004, 3027, 523-540.
    • (2008) SIAM J. Comput. , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 10
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sutcu, Y.; Li, Q.; Memon, N. Protecting biometric templates with sketch: Theory and practice. IEEE Trans. Inf. Forensics Secur. 2007, 2, 503-512.
    • (2007) IEEE Trans. Inf. Forensics Secur. , vol.2 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 15
    • 84876672622 scopus 로고    scopus 로고
    • EU-FP7 project, Available online, accessed on 21 February
    • EU-FP7 project. Trusted Revocable Biometric Identities. Available online: http://www.turbineproject.eu/ (accessed on 21 February 2012).
    • (2012) Trusted Revocable Biometric Identities
  • 16
    • 84855751108 scopus 로고    scopus 로고
    • Available online, accessed on 21 February
    • Simoens, K. TURBINE Security Assessment: How to Build Trust. Available online: http://www.turbine-project.eu/dowloads/Day1.4.3.TURBINE_Workshop_17012011_K.Simoens.pdf (accessed on 21 February 2012).
    • (2012) TURBINE Security Assessment: How to Build Trust
    • Simoens, K.1
  • 17
    • 84876683398 scopus 로고    scopus 로고
    • Available online, accessed on 21 February
    • GUC100 Multi-sensor Fingerprint Database. Available online: http://www.nislab.no/guc100/ (accessed on 21 February 2012).
    • (2012) GUC100 Multi-sensor Fingerprint Database
  • 22
    • 84873899238 scopus 로고    scopus 로고
    • The fuzzy vault for fingerprints is vulnerable to brute force attack
    • Darmstadt, Germany, 17-18 September
    • Mihailescu, P.; Munk A.; Tams, B. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack. In Proceedings of the BIOSIG 2009, Darmstadt, Germany, 17-18 September 2009; pp. 43-54.
    • (2009) Proceedings of the BIOSIG 2009 , pp. 43-54
    • Mihailescu, P.1    Munk, A.2    Tams, B.3
  • 25
    • 4344599787 scopus 로고    scopus 로고
    • Available online, accessed on 21 February
    • Daugman, J. Combining Multiple Biometrics. Available online: http://www.cl.cam.ac.uk/~jgd1000/combine/combine.html/ (accessed on 21 February 2012).
    • (2012) Combining Multiple Biometrics
    • Daugman, J.1
  • 26
    • 0036532848 scopus 로고    scopus 로고
    • Decision-level fusion in biometric verification
    • Prabhakar, S.; Jain, A.K. Decision-level fusion in biometric verification. Pattern Recognit. 2002, 35, 861-874.
    • (2002) Pattern Recognit , vol.35 , pp. 861-874
    • Prabhakar, S.1    Jain, A.K.2
  • 27
    • 84876667243 scopus 로고    scopus 로고
    • Available online, accessed on 9 April
    • NIST Fingerprint Image Quality (NFIQ). Available online: http://www.nist.gov/itl/iad/ig/nbis.cfm/ (accessed on 9 April 2012).
    • (2012) NIST Fingerprint Image Quality (NFIQ)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.